Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks

Size: px
Start display at page:

Download "Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks"

Transcription

1 Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks Yu Wang and Brahim Bensaou 2 Department of Electrical Engineering, National University of Singapore, 0 Kent Ridge Crescent, Singapore 9260 engp8843@nus.edu.sg 2 Centre for Wireless Communications, National University of Singapore, 20 Science Park Road, #02-34/37, Singapore 7674 brahim@cwc.nus.edu.sg Abstract. This article describes the Priority Based Multiple Access (PriMA) protocol, a new medium access control (MAC) protocol for single-channel ad-hoc networks. Unlike previously proposed protocols, PriMA takes into account the QoS requirements of the packets queued in stations to provide each station with a priority-based access to the channel. The direct support of PriMA for ad-hoc routing is that when some stations act as hubs in the routing structure and route packets for other stations besides their own, they can have high priorities and obtain larger share of bandwidth. Simulation results show the potential benefits that PriMA brings about to ad-hoc networks, and confirm PriMA as an initial step towards QoS provision in ad-hoc networks. Introduction An ad-hoc network is a dynamic multi-hop wireless network that is established by a group of mobile stations without the aid of any pre-existing network infrastructure or centralized administration. It can be installed quickly in emergency or some other special situations and is self-configurable, which makes it very attractive in many applications. Some applications include remote sensing (e.g. earthquakes, fire, environmental data gathering), robotic communication (e.g. cleaning, firefighting, patrolling, oceanic fishing, farming), Internet access and LEO constellations. Internet Engineering Task Force (IETF) has set up a workgroup named Mobile Ad-hoc Networks (MANET) [] to develop and evolve MANET routing specifications and introduce them to the Internet Standards track. Recent discussions in MANET s mailing list on MANET s application scenarios can give an idea of the fields when MANETs can be deployed (e.g. an ad-hoc network of New York taxi cabs). An efficient medium access control (MAC) protocol through which mobile stations can share a common broadcast channel is essential in an ad-hoc network because the medium or channel is a scarce resource. Due to the limited transmission range of mobile stations, multiple transmitters within range of the C.G. Omidyar (Ed.): MWCN 2000, LNCS 88, pp. 4 30, c Springer-Verlag Berlin Heidelberg 2000

2 Priority Based Multiple Access for Service Differentiation 5 same receiver may not know one another s transmissions, and thus in effect hidden from one another. When these transmitters transmit to the same receiver at around the same time, they do not realize that their transmissions collide at the receiver. This is the so-called hidden terminal problem [2] which is known to degrade throughput significantly. Due to their multi-hop characteristics, adhoc networks suffer much more from the hidden terminal problem than wireless LANs do. To address the hidden terminal problem, various distributed MAC protocols were proposed in the literature. MACA (Multiple Access Collision Avoidance) protocol [3] proposed exchange of short Request-to-Send (RTS) and Clear-to- Send (CTS) packets between a pair of sender and receiver before actual data packet transmission and formed the basis for several other more sophisticated schemes. Among them, FAMA-NCS (Floor Acquisition Multiple Access with Non-persistent Carrier Sensing) [4] is immune to the hidden terminal problem and can achieve good throughput in ad-hoc networks. IEEE 802. committee also proposed a MAC protocol called Distributed Foundation Wireless Medium Access Control (DFWMAC) for wireless ad-hoc LANs [5], which in essence is a variant of CSMA/CA protocols. DFWMAC provides basic and RTS/CTS access method. Chhaya and Gupta [6] have shown that the performance of RTS/CTS access method degrades much slower than the basic access method when the number of hidden terminals is large, or the offered load is significantly larger than the channel capacity; therefore, the RTS/CTS method is more robust to fluctuations in parameter values which are common in ad-hoc networks. In DFW- MAC RTS/CTS access method, 4-way dialog including RTS-CTS-DATA-ACK is used to combat the hidden terminal problem. DFWMAC, however, still cannot prevent data packets from colliding with control packets (RTSs and CTSs) and other data packets, instead, it uses a sophisticated modified binary exponential backoff scheme to quickly resolve collisions and thus increase throughput. These MAC protocols perform well in solving hidden terminal problem, however, none of them takes any step towards providing packet level QoS parameters such as packet loss ratio, packet delay, etc. They can support only best effort delivery service, thus limit the applications of ad-hoc networks. Recently, there has been a surge in modifying and extending equality-based medium access schemes to support priority-based access when the packets queued at stations have different QoS requirements. Although this research effort does not compete with the effort deployed in the Wireless LAN (infrastructure based), some researchers have been working on QoS support for distributed wireless networks [7, 8]. In [7], stations with real-time packets in the queue would jam the channel with Black Bursts (BBs) whose length is proportional to the delay incurred. The station that sends the longest BBs wins access to the channel and can transmit its packet thereafter. However, this approach fails when hidden terminals exist as those hidden terminals may have experienced the same delay and each BB contention period is not guaranteed to produce a unique winner, thus real-time data packets will still suffer from collisions. In [8], GAMA (Group Allocation Multiple Access) protocol was proposed for scheduling real-time and datagram traffic in

3 6 Yu Wang and Brahim Bensaou a single-hop wireless ad-hoc LANs. GAMA includes contention period during which stations can send request to join transmission group and contention-free period during which stations in transmission group take turns to transmit packets. This approach does not work well if hidden terminal exists. If hidden terminals do not join the transmission group that it may interfere with, GAMA cannot ensure data packets to be free from collision. If hidden terminals do join the transmission group to avoid collision, following the same logic, then all the other stations in the network have to join the same transmission group one by one. It is very difficult to maintain the global group due to the dynamic nature of ad-hoc network. In addition, we cannot benefit from spatial reuse. Therefore, these protocols that were originally proposed for wireless LANs are not directly applicable to multi-hop ad-hoc networks. We believe that a suitable MAC protocol for ad-hoc networks should address both hidden terminal problem and QoS issues at the same time. Another motivation for priority-based access is to provide better support for ad-hoc routing. On one hand, those protocols originally proposed for wireless LANs normally do not take routing into account as they expect a wireless access point that can reach all other stations and relay packets for them to be deployed. Therefore they are more fit for networks with infrastructure than adhoc networks where routing is another major issue. On the other hand, unlike in conventional wired networks, any host that act as a router in ad-hoc networks normally has only one network interface, there are no separate links for them to route packets or exchange routing information. Especially when some stations in an ad-hoc network behave as cluster heads [9] or belong to the core of the routing structure [0], more traffic will transit through them. Obviously, they need higher priorities in accessing the channel to route packets for others in addition to their own. In this paper, we propose a new protocol named Priority Based Multiple Access (PriMA) to support differentiated access priorities to the channel. It implements MAC-level acknowledgment as in DFWMAC while adopting the collision-free data transmission characteristics of FAMA-NCS. More importantly, it implements a novel distributed scheduling algorithm which gives stations a dynamic-priority based access to the channel by taking into account both the packet delay requirement and the packet loss ratio incurred by the ongoing session. The remainder of the paper is organized as follows. Section 2 describes PriMA protocol in detail. Section 3 compares by simulation the performance of FAMA-NCS, IEEE 802. DFWMAC and PriMA. Section 4 concludes this paper. 2 PriMA Protocol 2. Overview PriMA protocol requires a station that wishes to send a data packet to acquire the channel before transmitting the packet. The channel is acquired by establishing an RTS-CTS dialog between the sender and the receiver. Although multiple

4 Priority Based Multiple Access for Service Differentiation 7 control packets may collide, data packets are always sent free from collisions. This is achieved by the enforced requirements of size relationship between RTS and CTS as well as different periods a station should wait after receiving a packet or sensing the channel busy. Fullmer et al. [] have given detailed description about this. They showed that as long as the length of CTS packet is sufficiently longer than that of the RTS packet, CTS can act as a jamming signal to prevent other stations from transmission. Stations that hear the channel busy should wait long enough for the possible ongoing data transmission to go on unobstructed. PriMA s trivial extension to this is to reply an acknowledgment packet after successful reception of a data packet. This is also the common case in some other MAC protocols like DFWMAC. The extension of MAC-level acknowledgment still ensures data transmission free from collisions. The most important feature of PriMA is that the access to the channel is based on priorities of the packets queued in stations. This is achieved by three timers calculated according to the QoS requirements of the data packets in each station. The first is the access timer that a station should wait after the channel becomes idle before transmitting an RTS packet. The access time is similar to DIFS (Distributed InterFrame Space) in DFWMAC and the silent period of channel in FAMA-NCS. However, unlike the fixed length of DIFS and the random length of the silent period in FAMA-NCS, the access time is dynamically adjusted based on the QoS requirements. The second is the delay timer carried in every RTS packet. It indicates how long the intended receiver can wait before replying with a CTS packet. Therefore, an earlier sent RTS packet may be preempted by a later sent RTS packet which indicates a higher priority data packet transmission request. The third is the backoff time that a station should wait before retransmission when collision occurs. The backoff time is uniformly distributed, however the upper bounds of the distribution vary among stations. Stations that hold higher priority packets have lower upper bounds. Therefore, they can statistically recover earlier than other stations and bid for the channel again. For stations queued with normal data packets, we just set a large upper bound comparable to that of DFWMAC. Therefore, our backoff scheme is not necessarily more prone to collapse than binary exponential backoff with upper bound. 2.2 Description of PriMA To simplify our description of PriMA, the processing time and transmit-toreceive turnaround time are ignored. We say a station detects collisions if it senses the channel busy without being able to receive any intelligible packet. Following, we define some of the notations used in this section: rtpacket : Data packet with QoS parameters specified nrtp acket : Data packet without any QoS parameters specified T d : Maximum one-hop channel propagation delay

5 8 Yu Wang and Brahim Bensaou T type : Time to transmit a packet of type type where type can be either RTS, CTS, DATA or ACK T delay : Allowed delay time to reply to RTS, carried in RTS packet T left :TimeleftforartPacket to be delivered; when T left is less than a threshold, the corresponding rtpacket will be dropped. T max : Maximum time to complete one successful RTS-CTS-DATA-ACK transmission T access : Time required to sense the channel idle before transmitting an RTS packet T defer : The longest time a station should defer access when detecting collisions before entering backoff. It equals T data +3 T d. T unit : Time used as a factor to map packet delay requirement to backoff timer N lost : Number of packets dropped during the session N sent : Number of packets sent during a session PLR : Packet Loss Ratio (QoS requirement). Taccess RTS CTS DATA ACK A Tdelay RTS CTS DATA ACK B RTS CTS ACK C T T2 T 3 T4 T5 Fig.. PriMA illustration Figure shows how PriMA operates. In this figure, stations A and C are hidden from each other and station B is a neighbor of both A and C. As in all other collision avoidance multiple access techniques PriMA uses the RTS-CTS combination to implement collision avoidance, besides to ensure the problem of hidden terminals is addressed adequately, PriMA imposes FAMA s conditions on the sizes of the RTS and CTS packet []: T rts > 2 T d T cts >T rts +2 T d and stations that sense the channel busy should wait for T defer to let the possible ongoing data transmission to finish unobstructed. FAMA s rational in imposing these conditions, is that although C is hidden from A, and thus C did not hear

6 Priority Based Multiple Access for Service Differentiation 9 A s RTS, if C sends an RTS packet that at most collides with the CTS reply from B to A, the condition ensures that C hears the trailer of the CTS and thus C would abort any transmission and enters the backoff procedure. This ensures that the data packet from A to B is transmitted collision free. Note that it is not necessary to adopt these restrictions (enforced in FAMA) in PriMA to provide soft QoS. Nevertheless, we believe that it does not make sense to address the problem of QoS (be it soft QoS) without addressing first the hidden terminal problem, especially when the offered traffic load can be very high. PriMA s approach to providing QoS can also be applied to IEEE 802. s DFWMAC. In PriMA, any station that has a packet to send should wait until it senses the channel idle for a certain amount of time called access timer before transmitting an RTS request. The access time calculation, shown in Algorithm, is based on the required QoS and the perceived QoS. Algorithm Access timer calculation : if (nrtpacket or rtpacket with T left > sec)then 2: T access =2 T d 3: else 4: if (T left > 0) then 5: T access = T left (N lost PLR N sent) T max 6: if (T access < 0) then 7: T access =0 8: else 9: T access =2 T d / log 2 (T access/2) 0: end if : end if 2: end if Note that in order to reduce the waste of bandwidth due to this access time, time-sensitive packets which have a time to live of more than one second, compete at the same priority level as the non time sensitive packets. These packets would gain higher priorities when they become more urgent. Note that initially, at the packet s first attempt, T left is initialized to a value proportional to the maximum tolerable delay of the packet. Also, throughout the algorithm, T left decreases with the ticks of the clock in the same proportion. The calculation in line 5 of the algorithm shows that the more has a station suffered excess droppped packets (N lost PLR N sent ), the shorter T access will be. This excerpt of pseudo-code clearly shows that when two stations attempt to access the channel simultaneously T access will differentiate their attempts according to their packets QoS requirement. When a station succeeds in its access to the channel, it sets a delay field in its RTS packet and sends it out. The value of the field is denoted by T delay, which indicates how long the intended receiver can wait before replying with a CTS packet. T delay is calculated as shown in Algorithm 2.

7 20 Yu Wang and Brahim Bensaou Algorithm 2 Delay timer calculation : if (nrtpacket) then 2: T delay =2 T rts 3: else 4: if (T left /T max > 2) then 5: T delay =2 T rts 6: else 7: T delay =(T left /T max) T rts 8: end if 9: end if Packet arrival Station A T A access RTS B ta Station B T A delay CTS C time Station C tc RTS B T C delay T C access Packet arrival Fig. 2. Illustration of the preemption in PriMA To illustrate the importance of this second timer, let us consider the example in Figure 2 where twostations,a andc, attempt to communicate with station B. We will neglect the propagation times in this example. C s data packet arrives at the MAC layer at time t C later than A s data packet who arrives at t A, however, C s delay target is more stringent than A s. Due to the lack of a global coordinator in the system and the lack of a global state, there is no way for C to succeed in sending an RTS packet to B before A does, since t C + Taccces C > t A + Taccess A.AsetsavalueT delay A in its RTS packet which tells B the amount of time it can wait before replying with a CTS. After C hears the end of A s RTS (we will see later the case where A and C are hidden from each other), it will apply the same procedure it uses for the first access, however with only the remaining access timer. In other words, C will wait until it senses an idle channel for T left = t C + Taccces C t A Taccess A starting at t A + Taccess A + T RT S. If this left time is smaller than Tdelay A, i.e., if C s access timer expires before B replies with a CTS to A than C can send to B an RTS that will preempt A s RTS. This way, although A succeeded in sending the RTS before C, this latter has the possibility to preempt A before it starts transmitting its data packet. In the calculation of T delay for a real time packet, only T left is used. This is because T left is a composite value affected by both packet delay and packet drop ratio. Thus we can keep the algorithm simple yet effective. This algorithm shows that the RTS packet for a data packet that is more delay sensitive will have shorter T delay when the data packet is about to expire. The calculation will permit the packets to gain higher priorities after they are delayed for some

8 Priority Based Multiple Access for Service Differentiation 2 time. Stations usually do not reply with CTS immediately after receiving an RTS packet unless required to do so, therefore a station may receive multiple RTS packets in a row. If the later arrived RTS packet requires shorter delay than that of the earlier one, the station can reply to it first. This makes it possible for delay sensitive data packets to preempt other data packets. In addition, T delay does not exceed two times the RTS packet transmission time to minimize the protocol overhead. It is inevitable that control packets may collide with each other, therefore those stations that detect collisions should also wait for T defer andthenbackoff for a random time T backoff, which is calculated as shown in Algorithm 3, where U(0,x) is a uniformly distributed random number in the interval (0,x). Algorithm 3 Backoff timer calculation : if (nrtpacket or rtpacket with T left /T unit >Maxtimer) then 2: T backoff = U(0,Maxtimer) 2T d 3: else 4: T backoff = U(0,T left /T unit) 2T d 5: end if The value of Maxtimer is simply set to a large value, say 800, which is comparable to the maximum timer used in DFWMAC. For example, the IEEE 802. Wireless LAN standard specification for direct sequence spread spectrum (DSSS) uses a timer (or Contention Window, in 802. s terminology) ranging from 3 to 023. In PriMA, T backoff is based on a uniform distribution whose upper bound value varies according to the delay requirement of a data packet. This calculation will statistically give stations that have delay sensitive data packets shorter T backoff. Thus, on average, these stations will end the backoff period earlier than other stations and bid for the channel again. To illustrate how Algorithm 3 contributes in differentiating the stations, let us return to the example of Figure 2. In the case where A and C are hidden from each other. C cannot hear the RTS packet of A and thus after exhausting its timer Taccess, C it would also send an RTS packet which would collide at B with A s RTS packet. After Tdelay A (respectively T delay C ) station A (respectively station C) notices the collision by timeout, and thus they both apply the above backoff algorithm with their respective QoS targets. In this case, C has higher probability in bidding for the channel before A does, since C draws its uniformly distributed backoff time from a smaller interval than A does, and thus C has higher probability to terminate its backoff before A. From the above descriptions, we can see that by dynamically adjusting three timers, T access, T delay and T backoff, according to the data packets QoS requirements, PriMA can give stations priority-based access to the channel. At the same time, various waiting time periods are carefully defined to prevent control packets from colliding with data packets.

9 22 Yu Wang and Brahim Bensaou 3 Simulation Results PriMA is a complex MAC protocol for analytical modelling because of the danymic nature of the different timers, thus in this paper the performance of PriMA is investigated by simulations. In our experiments, we investigate symmetrical networks where each station has N neighbors and is hidden from Q neighbors of any one of its neighbors, thus each station has the same spatial characteristics. Figure 3 shows two sample configurations for N =4,Q =2and Q = 3. For example, for station A in figure 3(a), it has 4 neighbors including station B and is hidden from station B s 3 neighbors: C, D and E. As this graph can grow to infinitely large, we fold or collapse it so that the total number of stations in the network is limited while symmetry is maintained. The resulting graphs are shown in figure 4. A A C B E C B D D (a) N=4, Q=3 (b) N=4, Q=2 Fig. 3. Two sample configurations (a) N=4, Q=3 (b) N=4, Q=2 Fig. 4. Two sample configurations (collapsed)

10 Priority Based Multiple Access for Service Differentiation 23 We assume a Mbps ideal channel with zero preamble and processing overhead. We have performed different sets of simulations with OPNET Modeler/Radio and we compare our results to those provided by alternative protocols, notably FAMA-NCS and IEEE 802. DFWMAC. Table lists the parameters used in the simulation. As we ignore the extra time incurred by hardware and software, the different InterFrame Spaces (IFSs) in IEEE 802. are reduced accordingly and they are shown in table 2. Protocol RTS CTS DATA ACK backoff timer backoff unit time FAMA 20-byte 25-byte 500-byte µsec IEEE byte 20-byte 500-byte 20-byte µsec PriMA 20-byte 25-byte 500-byte 20-byte 800 2µsec Table. Protocol configuration parameters DIFS SIFS EIFS 2µsec 0µsec.3msec Table 2. Extra configuration parameters for IEEE 802. In the first set of simulations, all stations generate Poisson traffic with the same mean rate and all require best-effort delivery service. The simulation measures the throughput of the protocol against the degree of the nodes. The results are shown in Figure 5. For comparative purpose, we also show the analytical results for Slotted-ALOHA with separate acknowledgement channel and Non- Persistent CSMA in these figures. The figures demonstrate that FAMA s performance degrades dramatically when the number of competing stations (including neighbors and hidden terminals) increases. This is due to the ineffectiveness of uniform backoff scheme with small timer in collision resolution used in FAMA. However, it still performs well in other situations because of its immunity to hidden terminal problem. IEEE 802. performs quite well in all the situations because of its modified binary exponential backoff scheme. Although PriMA s performance is not quite outstanding when the number of competing stations is small, however, PriMA does achieve a rather stable throughput and is comparable to IEEE 802. when the number of competing stations increases. This is not surprising. PriMA, by introducing the different timers as well as the MAC acknowledgments in fact sacrifices throughput to achieve different priorities among the stations (which we show later). In addition, large backoff timers will become more effective when the number of competing stations increases, therefore the throughput difference between PriMA and IEEE 802. is decreasing. In other We use its specification for Direct Sequence Spread Spectrum if applicable.

11 24 Yu Wang and Brahim Bensaou words, PriMA captures in fact the effectiveness of FAMA in solving the hidden terminal problem as well as 802. s ability in sustaining throughput at high loads. It sacrifices however a little throughput by introducing the different timers in order to achieve differentiation between the stations as shown in the following. In the second set of simulations, each station still generates Poisson traffic with the same mean rate. However, we set one station (router) to generate packets that require delay-bounded delivery, while the other stations (hosts) have no delay requirement. This, in essence, makes the packets from the router have higher priority than packets from the hosts. This scenario may be applicable in a case when some stations form a group and choose one of them to act as a router. In other words, the router will handle a larger amount of traffic and thus needs some priority to access the channel. Simulation results are shown in figure 6 and 7 with different values of N and Q. The figure clearly shows that the router has higher throughput than other stations despite the fact that they all offer the same traffic load to the channel. Even when the number of competing stations increases, the router can still achieve much higher throughput than other normal stations. This differentiation cannot be achieved by FAMA-NCS and other non prioritized protocols such as IEEE 802. DFWMAC. In the third set of simulations, we select two stations (high priority router and low priority router) to generate constant rate packets that require different packet delivery delay bounds. We investigate two performance metrics under different scenarios: namely, the packet loss ratio (due to expiration), and the average delay. To get comparative results, we set the packet interarrival times equal to the packet delay requirement, otherwise protocols like IEEE 802. will never keep up with the packet generation rate and eventually will drop nearly all the packets. Simulation results are shown in figure 8. The first three sub-figures (8(a), 8(b), 8(c)) show the packet loss ratio against the offered load. They show that when the offered load increases, the packet drop ratio for IEEE 802. increases significantly while PriMA can still maintain low packet drop ratio for the two routers. Figure 8(d) shows that the average packet delay achieved by the two types of routers in PriMA. The figure clearly shows that when the traffic load is very low, the packets from all the stations experience the same (insignificant) delay. However, when the traffic load increases, the protocol starts differentiating the stations according to their requirements. 4 Conclusion PriMA is a new MAC protocol that is specifically designed for ad-hoc networks. It can achieve good throughput in ad-hoc networks where hidden terminal problem is common. In addition, every station has priority-based access to the channel, thus PriMA can provide elementary QoS support from the bottom up, making it a good choice for supporting higher layer protocols that require quality of service. Another benefit of PriMA is that it can provide better support for

12 Priority Based Multiple Access for Service Differentiation Slotted ALOHA w/acks NP CSMA IEEE 802., Q=N FAMA NCS, Q=N PriMA, Q=N 0.7 S(Throughput) Number of Neighbors Slotted ALOHA w/acks NP CSMA IEEE 802., Q=N/2 FAMA NCS, Q=N/2 PriMA, Q=N/2 0.7 S(Throughput) Number of Neighbors Fig. 5. Throughput versus node degree

13 26 Yu Wang and Brahim Bensaou Throughput comparison for N=3, Q=2 in Mbps ideal channel router throughput (delay req.:0.0s) other host s throughput (router delay req.:0.0s) router throughput (delay req:0.05s) other host s throughput (router delay req.:0.05s) router throughput (delay req:s) other host s throughput (router delay req.:s) router throughput (delay req:s) other host s throughput (router delay req.:s) 0.6 Throughput Each station s load (a) 2 delay req.:0.0s delay req.:0.05s delay req.:s delay req.:s Router s delay for N=3, Q=2 in Mbps ideal channel Average delay(seconds) Each station s load (b) Fig. 6. One router configuration (N=3)

14 Priority Based Multiple Access for Service Differentiation Throughput comparison for N=4, Q=3 in Mbps ideal channel router throughput (delay req.:0.0s) other host s throughput (router delay req.:0.0s) router throughput (delay req:0.05s) other host s throughput (router delay req.:0.05s) router throughput (delay req:s) other host s throughput (router delay req.:s) router throughput (delay req:s) other host s throughput (router delay req.:s) 0.6 Throughput Each station s load (a) 2 delay req.:0.0s delay req.:0.05s delay req.:s delay req.:s Router s delay for N=4, Q=3 in Mbps ideal channel Aveage delay(seconds) Each station s load (b) Fig. 7. One router configuration (N=4)

15 28 Yu Wang and Brahim Bensaou 0.9 Loss ratio comparison for N=4, Q=3 in Mbps ideal channel PriMA (on off source,delay req:0.03s) PriMA (on off source,delay req:0.06s) IEEE 802. (on off source,delay req:0.03s) IEEE 802. (on off source,delay req:0.06s) Loss ratio Normalized other stations load (a) 0.9 Loss ratio comparison for N=4, Q=3 in Mbps ideal channel PriMA (on off source,delay req:0.04s) PriMA (on off source,delay req:0.08s) IEEE 802. (on off source,delay req:0.04s) IEEE 802. (on off source,delay req:0.08s) Loss ratio Normalized other stations load (b) Fig. 8. QoS differentiation

16 Priority Based Multiple Access for Service Differentiation Loss ratio comparison for N=4, Q=3 in Mbps ideal channel PriMA (on off source,delay req:0.05s) PriMA (on off source,delay req:0s) IEEE 802. (on off source,delay req:0.05s) IEEE 802. (on off source,delay req:0s) Loss ratio Normalized other stations load (c) Delay comparison for N=4, Q=3 in Mbps ideal channel High priority router(delay req:0.03s) Low priority router(delay req:0.06s) High priority router(delay req:0.04s) Low priority router(delay req:0.08s) High priority router(delay req:0.05s) Low priority router(delay req:0s) 0.07 Average delay(seconds) Normalized other stations load (d) Fig. 8. QoS differentiation (con t)

17 30 Yu Wang and Brahim Bensaou ad-hoc routing as some packets can be given higher priorities and get delivered earlier than others. Simulation results show that PriMA is an especially promising MAC protocol for ad-hoc networks in presence of heterogeneous traffic and QoS requirements. References [] [2] F. A. Tobagi and L. Kleinrock, Packet Switching in Radio Channels: Part II - the Hidden Terminal Problem in Carrier Sense Multiple-access Modes and the Busy-tone Solution, in IEEE Transactions on Communications, vol. COM-23, no. 2, pp , 975. [3] P. Karn, MACA - a New Channel Access Method for Packet Radio, in ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pp , ARRL, 990. [4] J. Garcia-Luna-Aceves and C. L. Fullmer, Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks, in Proceedings of 3rd IEEE ISCC, 998. [5] IEEE Computer Society LAN MAN Standards Committee, ed., IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std , The Institute of Electrical and Electronics Engineers, New York, 997. [6] H. S. Chhaya and S. Gupta, Throughput and Fairness Properties of Asynchronous Data Transfer Methods in the IEEE 802. MAC Protocol, in 6th International Conference on Personal, Indoor and Mobile Radio Communications, 995. [7] J. L. Sobrinho and A. S. Krishnakumar, Quality-of-Service in Ad Hoc Carrier Sense Multiple Access Wireless Networks, in IEEE Journal on Selected Areas in Communications, Vol. 7, No. 8, pp , 999. [8] A. Muir and J. J. Garcia-Luna-Aceves, Supporting real-time multimedia traffic in a wireless LAN, in Proc. SPIE Multimedia Computing and Networking, pp. 4 54, 997. [9] M. L. Jiang, J. Y. Li, and Y. C. Tay, Cluster Based Routing Protocol(CBRP) Functional Specification. draft-ietf-manet-cbrp-spec-00.txt, Aug Work in progress. [0] R. Sivakumar, P. Sinha, and V. Bharghavan, Core Extraction Distributed Ad hoc Routing (CEDAR) Specification. draft-ietf-manet-cedar-spec-00.txt, Oct Work in progress. [] C. L. Fullmer and J. J. Garcia-Luna-Aceves, Solutions to Hidden Terminal Problems in Wireless Networks, in Proceedings of ACM SIGCOMM, 997.

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic

A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic Rao Jianqiang 1, Jiang Shengming 2,andHeDajiang 1 1 Department of Electrical Engineering, National University of

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks

Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks J.J. Garcia-Luna-Aceves and Chane L. Fullmer Abstract The performance of the FAMA-NCS protocol in ad-hoc networks is analyzed. FAMA-NCS

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Fair Medium Access in based Wireless Ad-Hoc Networks

Fair Medium Access in based Wireless Ad-Hoc Networks Fair Medium Access in 802.11 based Wireless AdHoc Networks Brahim Bensaou Centre for Wireless Communications National University of Singapore 20 Science Park Road, #0234/37 Singapore 117476 brahim@cwc.nus.edu.sg

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,

More information

WITH advances in wireless communications and the

WITH advances in wireless communications and the 1 Priority Scheduling in Wireless Ad Hoc Networks (Draft Version) Xue Yang and Nitin.H.Vaidya Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Ad hoc networks formed without

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Priority Scheduling in Wireless Ad Hoc Networks

Priority Scheduling in Wireless Ad Hoc Networks Priority Scheduling in Wireless Ad Hoc Networks Xue Yang Nitin H.Vaidya Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information